Default Cover Image

Computer Science and Information Engineering, World Congress on

Mar. 31 2009 to Apr. 2 2009

Los Angeles, California USA

ISBN: 978-0-7695-3507-4

Volume:

Table of Contents

Papers
Conference Information - Volume 1Freely available from IEEE.pp. xvii-xxix
Papers
[Copyright notice - Volume 1]Freely available from IEEE.pp. iv
Papers
Table of contents - Volume 1Freely available from IEEE.pp. v-xvi
Papers
Title Page i - Volume 1Freely available from IEEE.pp. i
Papers
Title Page iii - Volume 1Freely available from IEEE.pp. iii
Papers
A Multiple Trees-Based Data Dissemination Scheme in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Papers
Developing Test System of Ad Hoc Network for Emergency CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 5-9
Papers
A Backbone Routing Protocol Based on the Connected Dominating Set in Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 14-18
Papers
Distributed Clustering Algorithm with Load Balancing in  Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 19-23
Papers
Employing CHNN to Develop a Data Refining Algorithm for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 24-31
Papers
Routing Design of Wireless Sensor Networks in Mine Monitoring SystemFull-text access may be available. Sign in or learn about subscription options.pp. 32-37
Papers
Impact of Mobility in Ad Hoc Protocol DesignFull-text access may be available. Sign in or learn about subscription options.pp. 38-43
Papers
Provisioning QoS in Wireless Sensor Networks Using a Simple Max-Min Fair Bandwidth AllocationFull-text access may be available. Sign in or learn about subscription options.pp. 44-48
Papers
Impact of Link Layer on Routing Protocols in Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 49-52
Papers
Method to Improve the Performance of Common Channel FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 53-57
Papers
Wireless Sensor Network for Orchard Soil and Climate MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 58-62
Papers
An Improved Fast Approach for DOA Tracking EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 63-67
Papers
Evolutionary Design of On-Chip Antenna for HF LabelFull-text access may be available. Sign in or learn about subscription options.pp. 68-72
Papers
The Fractional Brownian Channel Model Considering the Statistical Characters in WCDMAFull-text access may be available. Sign in or learn about subscription options.pp. 73-76
Papers
Design of a Broad/Dual-Band Circularly Polarized Square Slot Antenna Using Genetic Local Search AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 77-80
Papers
Study on the Biconical Antenna in the EMC Test Suitable for Engineering MachineryFull-text access may be available. Sign in or learn about subscription options.pp. 81-84
Papers
UV NLOS Communications Atmospheric Channel Model and Its Performance AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 85-88
Papers
Study on the Quantitative Analysis of Turbo-Unit Fault Based on Lyapunov Exponent-Correlation DimensionFull-text access may be available. Sign in or learn about subscription options.pp. 89-92
Papers
Automatic Generation of Host-Based Network Attack GraphFull-text access may be available. Sign in or learn about subscription options.pp. 93-98
Papers
A Location-Based Mechanism for Mobile Device SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 99-104
Papers
Frequency Weighted Hamming Distance for System Call Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 105-109
Papers
Architecture and Key Technologies of Interactive Intelligent CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 110-114
Papers
The Investigation of Inter-organizational Information Systems Capabilities in Hebei Province, ChinaFull-text access may be available. Sign in or learn about subscription options.pp. 115-119
Papers
A Technology of Agent-Cache Used in Mobile Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 120-124
Papers
Remarks on Cryptanalysis of RSA Using Lattice Basis ReductionFull-text access may be available. Sign in or learn about subscription options.pp. 125-129
Papers
Efficient Schnorr Type Identity-Based Blind Signatures from Bilinear PairingsFull-text access may be available. Sign in or learn about subscription options.pp. 130-134
Papers
Understanding and Supporting Live and On-Demand Streaming ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 135-139
Papers
Peer Caching Algorithm Based on Global Segment Popularity for P2P VoD SystemFull-text access may be available. Sign in or learn about subscription options.pp. 140-144
Papers
An Adaptive Approach of String Metrics Application in the Intrusion Detection SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 145-149
Papers
Automated Risk Assessment for Sources and Targets of Vulnerability ExploitationFull-text access may be available. Sign in or learn about subscription options.pp. 150-154
Papers
Research on the Optimization of Encryption and Authentication Mode of EAX about Broadband Wireless Communications EquipmentFull-text access may be available. Sign in or learn about subscription options.pp. 155-159
Papers
Replay Protection at the Link Layer Security in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 160-165
Papers
Research of Peak-to-Average Power Ratio Reduction Improved Algorithm for MIMO-OFDM SystemFull-text access may be available. Sign in or learn about subscription options.pp. 171-175
Papers
An Effective Low-Complexity Method for PAPR Reduction in OFDM-Based SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 176-180
Papers
A Simplified NLS Frequency Offset  Estimator for OFDM SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 181-185
Papers
A Real-Time Planning-Based Scheduling Policy with CAN for Automotive Communication SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 186-191
Papers
Research on the Criterion of Wireless Optical Access System and Its ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 192-196
Papers
A Novel Optical Multiplexing Approach for Computer Interconnection and Optical Digital TransmissionFull-text access may be available. Sign in or learn about subscription options.pp. 197-202
Papers
A Novel Family of Complex Hadamard Matrices with Cyclically Distinct Rows and Large Linear SpanFull-text access may be available. Sign in or learn about subscription options.pp. 203-207
Papers
OCDMA over WDM System Based on Chebyshev-Map Chaotic Spread Spectrum in Passive Optical NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 208-211
Papers
A Multi-perspective Monitoring Engine for Hybrid NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 212-215
Papers
Exponential Stability of Series CMS with a Single Storage BufferFull-text access may be available. Sign in or learn about subscription options.pp. 216-220
Papers
A Novel Algorithm for Critical PathsFull-text access may be available. Sign in or learn about subscription options.pp. 226-229
Papers
A Three-Layer Network Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 230-234
Papers
Design and Implementation of a Mobile GIS for Field Data CollectionFull-text access may be available. Sign in or learn about subscription options.pp. 235-241
Papers
Improvement of the Fusing Genetic Algorithm and Ant Colony Algorithm in Virtual Enterprise Partner Selection ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 242-246
Papers
State Feedback Stabilization of Neutral Type Descriptor SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 247-251
Papers
Study of Topological Dynamics and Periodicity of LEO Satellite Networks Based on Spectral AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 252-257
Papers
Unequal Clustering Mechanism of LEACH Protocol for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 258-262
Papers
The Study on Difference among Flow Specifications in InternetFull-text access may be available. Sign in or learn about subscription options.pp. 263-267
The Wireless Remote Control System for Portable X-Ray MachineFull-text access may be available. Sign in or learn about subscription options.pp. 354-358
Papers
Using Gray Relation and Quality Function Deployment in Service Quality of the Cable TVFull-text access may be available. Sign in or learn about subscription options.pp. 268-272
Papers
An Economic Analysis on Sharing Behavior in Peer-to-Peer Software UsageFull-text access may be available. Sign in or learn about subscription options.pp. 273-277
Papers
A New Stream Cipher Based on Coupled Map Lattices MapFull-text access may be available. Sign in or learn about subscription options.pp. 278-282
Papers
City Imaging after Kevin LynchFull-text access may be available. Sign in or learn about subscription options.pp. 283-287
Papers
A Heuristic Algorithm for Topological Optimization of All-Optical NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 288-292
Papers
A Dynamic Online Traffic Classification Methodology Based on Data Stream MiningFull-text access may be available. Sign in or learn about subscription options.pp. 298-302
Papers
Bloom Filter Based Index for Query over Encrypted Character Strings in DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 303-307
Papers
ALBPS: An Adaptive Approach on Reduction Redundancy in Latency-Aware Peer-to-Peer Content Delivery System with Network CodingFull-text access may be available. Sign in or learn about subscription options.pp. 308-314
Papers
A Framework and Prototype for Service MobilityFull-text access may be available. Sign in or learn about subscription options.pp. 315-319
Papers
An Efficient Mixed-Mode Execution Environment for C on Mobile Phone PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 320-328
Papers
The Co-existing Interference Analysis between TD-SCDMA and WiMAXFull-text access may be available. Sign in or learn about subscription options.pp. 329-333
Analysis of Time Delay of Packet on Multi-service System in Loop LANFull-text access may be available. Sign in or learn about subscription options.pp. 409-412
Papers
A New Node Localization Algorithm of Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 334-338
Papers
The Performance Analysis of Chan Location Algorithm in Cellular NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 339-343
Papers
A Data Aggregation Model for Underground Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 344-348
Papers
A Kind of Survivability Evaluation Technique for Tactical Data Link NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 349-353
Papers
Spectrum Detection Based Cyclostationarity in Spectrum Pooling SystemFull-text access may be available. Sign in or learn about subscription options.pp. 359-363
Papers
Unsplit-Field FDTD Simulation of a Mobile Phone Operating Near a Metal WallFull-text access may be available. Sign in or learn about subscription options.pp. 364-368
Papers
Stability of FAST TCP in Single-Link Multi-source NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 369-373
Papers
Network-Based Fleet Management Systems for Streamline Maritime Operation - A Case Study of F Plastics Marine CorporationFull-text access may be available. Sign in or learn about subscription options.pp. 374-378
Papers
A New Hybrid Approach for Detection and Estimation in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 379-383
Papers
Dynamic Framed Slotted ALOHA Algorithm Based on Bayesian Estimation in RFID SystemFull-text access may be available. Sign in or learn about subscription options.pp. 384-388
Papers
Challenges for End-to-End Quality of Service in Heterogeneous NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 389-393
Papers
Fixed WiMAX Downlink Spectral Efficiency and Throughput Measurements under Channel ImpairmentsFull-text access may be available. Sign in or learn about subscription options.pp. 394-398
Papers
A Virtual Multiple Terminal Scheduling Scheme in the Infrastructure Based Wireless LAN to Enhance the VoIP CapacityFull-text access may be available. Sign in or learn about subscription options.pp. 399-403
Papers
Achieving Dependability through Dynamic Reconfiguration in Sensor Operating SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 404-408
Papers
CSMA/CA MAC Protocol Design for Topology Controlled Ad Hoc Networks: A Cross Layer ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 413-417
Papers
Self-Selection Based Adaptive Routing for MANETFull-text access may be available. Sign in or learn about subscription options.pp. 418-422
Papers
Ant Colony Based Routing Algorithm for Multi-sink NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 423-429
Papers
Link Scheduling with Physical Interference Model for Throughput Improvement in Wireless Multi-hop NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 430-434
Papers
Iterative Composite Encryption Algorithm Based on Tea and ElgamalFull-text access may be available. Sign in or learn about subscription options.pp. 435-438
Papers
Strand Space Model of Amended NS Protocol and Its AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 439-442
Papers
Dynamic Dictionary Design for SIP Signaling CompressionFull-text access may be available. Sign in or learn about subscription options.pp. 448-451
Papers
A Fast Acquisition Method of DSSS Signal Based on Double FFT LayersFull-text access may be available. Sign in or learn about subscription options.pp. 452-456
Papers
Signal and Modulation Type Detection Using Wavelet TransformFull-text access may be available. Sign in or learn about subscription options.pp. 457-460
Papers
TOA Estimation for IR-UWB System Using Matrix PencilFull-text access may be available. Sign in or learn about subscription options.pp. 461-464
Papers
Algorithms of Channel Estimation and Tracking in MB-OFDM UWB SystemFull-text access may be available. Sign in or learn about subscription options.pp. 465-469
Papers
The Concept and Framework of All Network Service (ANS)Full-text access may be available. Sign in or learn about subscription options.pp. 470-476
Papers
The Design and Research of Video Grid of Scalable Multilevel ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 477-481
Showing 100 out of 165